It would be beneficial to get a notification when license count gets to x number. We are syncing our users with DirSync and apply licenses based on group membership. When users get synced and we have no licenses, I have zero idea until someone comes to me that they cannot get logged in to O365.

Delegate permission to view the Bitlocker recovery key to other roles than Global admins (e.g. Device administrators). Our clients guys are responsible for managing the devices, and they will support the end users.
Or provide RBAC for Azure AD to build customer roles.

Currently, there is no SLA/timeframe on when dynamic AAD device groups evaluate memberships.

Here is the recommended troubleshooting steps for these groups not populating, straight from the Azure portal:
"Please allow time for the group to populate. Depending on the size of your tenant, the group may take up to 24 hours for populating for the first time or after a rule change."

If admins are using dynamic AAD device groups for any sort of application deployment or policy targeting, waiting up to 24 hours may not be reasonable. It would be very helpful if there was a way to kick off a manual group evaluation, or at least provide a consistent timeframe/SLA where admins can expect to see their devices populate into the group.

I have seen devices get added in minutes, or up to close to 24 hours. There does not seem to be any consistency on when these devices get populated into the group.

Currently, there is no SLA/timeframe on when dynamic AAD device groups evaluate memberships.

Here is the recommended troubleshooting steps for these groups not populating, straight from the Azure portal:
"Please allow time for the group to populate. Depending on the size of your tenant, the group may take up to 24 hours for populating for the first time or after a rule change."

If admins are using dynamic AAD device groups for any sort of application deployment or policy targeting, waiting up to 24 hours may not be reasonable. It would be very helpful if there was a way to…

We would like to have our Tenant added to Public Preview for Assign licenses to users by group membership in Azure Active Directory Service.
OR
It would be great if we can know the Estimated date for this Service to be Generally Available.

Currently, the group owner on Azure AD Portal is mapped to "Owner" attribute while the Office 365 Admin Portal is mapped to "ManagedBy". For a group which is synced from local AD to the AAD via AAD Connect, there is no way to update the "Owner" attribute on Azure AD.

The AAD Connect does not support "Owner" attribute for sync and we can't assign "Owner" on Azure AD as it is a synced object.

So to resolve this issue, the "Owner" attribute should be supported as an attribute for sync on the Azure AD Connect.

I'd like to link my MSDN account with my corporate account so I only have to sign in once to see all my Azure capabilities. I would give my corporate account portal permissions to federate (aka login to) and see my MSDN account. This way I don't have to keep switching accounts to work in the portal.

I can't believe that this is not standard. Some features, like conditional access are useless and feature breaking if you have a dual stack or IPv6 network.

Normally, this would be a planning no no, and would get an automatic product rejection because of the lack of support of a mainstream networking protocol. But because of the size of our current investment in Microsoft, we are at your mercy.

We will be warning all our connections of this lack of support and apparent lack of road map so that they do not also find themselves in our position.

Include, by default, support for IPv6 across the entire Azure stack.

I can't believe that this is not standard. Some features, like conditional access are useless and feature breaking if you have a dual stack or IPv6 network.

Normally, this would be a planning no no, and would get an automatic product rejection because of the lack of support of a mainstream networking protocol. But because of the size of our current investment in Microsoft, we are at your mercy.

We will be warning all our connections of this lack of support and apparent lack of road map so that…

Allow users to request admin consent to an application and have that appear within the portal, as an administrator it's a challenge to source the application_id and approve the application for all users if required.

There is a setting that allows you to prevent users from seeing other users in the directory. This setting is called ‘UsersPermissionToReadOtherUsersEnabled’ and can only be set by using the Microsoft Online powershell commandlets, specifically Set-MsolCompanySettings.

I’ll leave this item open since I’d be interested in hearing feedback in the comments section if this is the functionality you’re interested in and if so and there’s a lot of votes for this item, we can look at exposing it in the portal (vs requiring PowerShell).

DreamSpark and Cloud Solution Provider (CSP) subscriptions don’t have access to the classic portal, either. Is there a workaround for managing the Azure AD or providing a V1 vent to to the webapps created in the ARM portal. How can a CSP partner get the access to the classic portal?

If you create an "Access to Azure Active Directory" subscription from your Office 365 subscription when you are logged with the wrong global admin (Office 365) then you cannot change the Account Administrator (Azure) because the subscription cannot be transferred.

The only workaround is to log on with a different global admin and create a new Azure subscription to the same Office 365 tenant.

It is quite confusing and the documentation below should be amended or the procedure simplified so the Azure Account Administrator can be changed or the subscription transferred.

I would like to see support for lifecycle management of guest accounts. E.g. based on the guest account login/access activity, the external user should receive an email to confirm that the guest account in our tenant is still needed. This sounds similar to "Access reviews" which is currently in preview but it doesn't consider user accounts as such. It would also be good to have a proper monitoring similar to what is available in PIM where you can see if roles have been activated.

I can generally see that functionalities are there already in other places so it shouldn't be that hard to put those peaces together in a new way to make this possible.

I would like to see support for lifecycle management of guest accounts. E.g. based on the guest account login/access activity, the external user should receive an email to confirm that the guest account in our tenant is still needed. This sounds similar to "Access reviews" which is currently in preview but it doesn't consider user accounts as such. It would also be good to have a proper monitoring similar to what is available in PIM where you can see if roles have been activated.

I can generally see that functionalities are there already in other places so it shouldn't be…

Under all the Security alerts, I would like to have to the ability to mark at it as working on by me.
For Example I can right click on an alert or under the context menu and mark it as being worked on. This will allow my Co-workers the ability to move onto the next alert. This alleviate duplicate work among my team mates.

Is there a way to let a device sync to Azure Active Directory every hour or so if Bitlocker is still active? You can already see the decryption key and when it is registered. However, we have to have prove that the device was encrypted at the moment it was stolen.